2 RELATED WORK
The seminal paper on anonymous sytems was written
by David Chaum (Chaum, 1981). He proposed a sys-
tem for anonymous email based on the so called mix
networks. A mix node shuffles a batch of messages
and delivers them in random order. This design has
been followed by many anonymous systems. The first
widely used implementation of mix networks was the
Type I cypherpunk anonymous remailers (Goldberg
et al., 1997), using PGP (Zimmermann, 1995) encryp-
tion to wrap email messages and deliver them anony-
mously. They were followed by MixMaster (M¨oller
et al., 2003), and then MixMinion (Danezis et al.,
2003).
Although the mix design has been quite influen-
tial, there are a number of notable alternatives. A net-
work that uses a different approach is Crowds (Re-
iter and Rubin, 1998), designed for anonymous web
browsing. Briefly, Crowds nodes forward web request
to each other at random, executing a form of a random
walk.
3 BACKGROUND
In Crowds, the initiator node creates a packet con-
taining a random path identifier, the IP address of the
responder and the data. Then, it flips a biased coin.
With probability 1 − p
f
(p
f
is the probability of for-
warding and it is a parameter of the system) it delivers
the message directly to the responder or destination
node, and with probability p
f
it chooses randomly
the next relay node. Each node decides- based on p
f
-
whether to forward it to the responder or to another
(randomly chosen) relay node. With this original al-
gorithm the forwarding procedure is not limited and,
as we previously pointed out, it could be a tragedy re-
garding communication costs in an overlay scenario.
A possible solution is to restrict the maximum
length of the paths. The system operates as the tradi-
tional scheme but, when the number of hops reaches
a certain limit (called S), the path will be directed
towards the destination node. A straightforward im-
plementation consists of using a time-to-live (TTL)
field, initially set to S, and processing it like in IPv4
networks (Postel, 1981). However, there are multiple
situations in which this implementation will immedi-
ately reveal to a ”corrupt” node whether the prede-
cessor node is the initiator or not. Therefore, we can
conclude that the TTL methodology is not appropriate
to limit the length of multi-hop paths.
4 PROPOSED MECHANISM
The algorithm proposed in this work, as in Crowds,
is based on the random-walk procedure. However,
the variance associated to the length of the multi-hop
paths is smaller than that in Crowds. Therefore, it
can be viewed as a quasi-deterministic mechanism of
a statistical TTL implementation.
Our first attempt is the always-down (AD) algo-
rithm: The path originator chooses a uniform random
number (called u) between 1 and a predefined param-
eter M. If the value of u is equal to 1, the originator
sends the request directly to the destination. Other-
wise, the node forwards the request to a random node
together with the random number u. The next node
performs the same operation but replacing the upper
bound M with the value of u. The mechanism contin-
ues in a recursiveway, decreasing the size of the inter-
val [1, u) in each step. However, with this algorithm
there is still correlation between the random number
u and the hop length: although little values do not
reveal anything about the path length, great ones do,
since they can only appear at the first steps of the al-
gorithm.
The opposite algorithm, called always-up (AU)
has the same benefits and drawbacks. Now, at each
step the node chooses a uniform random number be-
tween (u, M]. When a node selects M, the random
walk procedure ends and the request is directly sent
to the responder. In this case, great values of u do not
reveal anything about the path length, but small ones
do, since they can only appear at the first steps of the
algorithm.
In order to avoid this critical issue, we propose to
mix both mechanism as follows: The path originator
chooses a random number (called u) between 1 and
M. When this number is equal to 1 or equal to M,
the originator node sends the request to the responder.
If u is lower than a parameter LOW
BORDER, the
algorithm works like AD. However, if u is greater than
a paramater TOP
BORDER, the algorithm operates
like AU. Finally, if u drops between LOW
BORDER
and TOP BORDER, the operation mode (AD or AU)
is chosen randomly.
This new algorithm is called always down-or-up
(ADU) and it is able to statistically limit the length
of the path in an anonymous environment. In order
to speed up the algorithm, we introduce an additional
parameter called e: If the new chosen random num-
ber is smaller than or equal to e (or it is greater than
M − e) the originator node delivers the request to the
responder. Figure 1 represents the full set of parame-
ters used by our algorithm in a numerical straight line.
SECRYPT 2008 - International Conference on Security and Cryptography
206